Results 41 to 50 of about 4,651 (205)

Location-Based Beamforming for Rician Wiretap Channels

open access: yes, 2015
We propose a location-based beamforming scheme for wiretap channels, where a source communicates with a legitimate receiver in the presence of an eavesdropper.
Liu, Chenxi, Malaney, Robert
core   +1 more source

Optimal Beamforming for Physical Layer Security in MISO Wireless Networks [PDF]

open access: yes, 2018
A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped with multiple antennas while the users and eavesdropper are equipped with a single antenna, is considered.
Duong, Trung Q.   +3 more
core   +2 more sources

On the Analysis of Secrecy Outage Probability Using Average Channel Capacity

open access: yesSakarya University Journal of Science, 2020
In this article, we analyze the outage probability of physically secure wireless signal transmission in fading envi-ronments where both primary and eavesdropper channels are subject to generalized fading. We propose a novel approach using the average channel capacity of the primary channel and that of the eavesdropper channel to the outage probability ...
openaire   +5 more sources

Physical Layer Security Enhancement of Space-Time Block Code Using Channel Prediction for Antenna Selection [PDF]

open access: yesJisuanji gongcheng, 2020
Aiming at Transmit Antenna Selection with Delay(TASD)/Orthogonal Space-Time Block Code(OSTBC) wireless communication system,this paper proposes a system physical layer security enhancement scheme based on the Minimum Mean Square Error(MMSE) channel ...
QIAN Hui, LI Guangqiu, WANG Lingbo, CAI Jianhui
doaj   +1 more source

Location-Based Beamforming and Physical Layer Security in Rician Wiretap Channels

open access: yes, 2016
We propose a new location-based beamforming (LBB) scheme for wiretap channels, where a multi-antenna source communicates with a single-antenna legitimate receiver in the presence of a multi-antenna eavesdropper.
Liu, Chenxi, Malaney, Robert
core   +1 more source

Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks

open access: yesTongxin xuebao, 2016
A secure access strategy for D2D (device-to-device) communications underlaying cellular networks based on the secrecy outage probability was proposed.Firstly,the secrecy outage probability in the worst case was derived and a transmission power ...
Ya-jun CHEN   +3 more
doaj   +2 more sources

Secrecy outage probability analysis of energy‐aware relay selection for energy‐harvesting cooperative systems

open access: yesIET Communications, 2022
The secrecy outage performance for a cooperative cognitive radio energy‐harvesting network is analyzed. The cognitive network is composed of an energy‐constrained cognitive source (CS), multiple energy‐constrained cognitive relays (CRs) and a cognitive ...
Yujie Zhang   +3 more
doaj   +1 more source

On the secrecy performance of RIS-enabled wireless communications over Nakagami-m fading channels

open access: yesICT Express, 2023
This paper examines the secrecy performance of reconfigurable intelligent surface aided wireless communication systems. Specifically, we derive the secrecy outage probability (SOP), intercept probability, probability of non-zero secrecy capacity, and ...
Ashutosh K. Yadav   +3 more
doaj   +1 more source

Outage Constrained Robust Secure Transmission for MISO Wiretap Channels [PDF]

open access: yes, 2013
In this paper we consider the robust secure beamformer design for MISO wiretap channels. Assume that the eavesdroppers' channels are only partially available at the transmitter, we seek to maximize the secrecy rate under the transmit power and secrecy ...
Hong, Mingyi   +4 more
core  

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Home - About - Disclaimer - Privacy